Splunk Search

help on token which has to return empty values

jip31
Motivator

hello

 

I use a scheduled search where I stats events like this :

| stats last(LastReboot) as "Last reboot date" by host CATEGORY DEPARTMENT 

For the moment, in DEPARTMENT field I have a lot of empty fields

In the dashboard, I call my scheduled search and I use token filters

| loadjob savedsearch="admin:SA_XXX_sh:LogLogon" 
| search CATEGORY=$tok_filtercategory|s$ 
| search DEPARTMENT=$tok_filterdepartment$ 

What I dont understand is why the events are not displayed if DEPARTMENT fiel is empty?

Thanks

Tags (1)
0 Karma
1 Solution

scelikok
SplunkTrust
SplunkTrust

Hi @jip31,

stats command cannot group empty fields, you can try below;

| fillnull value="empty" DEPARTMENT
| stats last(LastReboot) as "Last reboot date" by host CATEGORY DEPARTMENT
If this reply helps you an upvote and "Accept as Solution" is appreciated.

View solution in original post

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @jip31,

stats command cannot group empty fields, you can try below;

| fillnull value="empty" DEPARTMENT
| stats last(LastReboot) as "Last reboot date" by host CATEGORY DEPARTMENT
If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...